First published: Wed Oct 25 2023(Updated: )
PackageKit. The issue was addressed with improved checks.
Credit: Arsenii Kostromin (0x3c3e) Mickey Jin @patch1t Hevel Engineering Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) Mickey Jin @patch1t Hevel Engineering Arsenii Kostromin (0x3c3e) Arsenii Kostromin (0x3c3e) Mickey Jin @patch1t Hevel Engineering Arsenii Kostromin (0x3c3e) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.7.1 | 12.7.1 |
Apple macOS | >=12.0<12.7.1 | |
Apple macOS | >=13.0<13.6.1 | |
Apple macOS | =14.0 | |
Apple macOS | <14.1 | 14.1 |
Apple macOS | <13.6.1 | 13.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42877 has been classified as a significant security vulnerability due to its potential to allow unauthorized modifications to protected parts of the file system.
To fix CVE-2023-42877, update your macOS to the latest versions: macOS Sonoma 14.1, macOS Monterey 12.7.1, or macOS Ventura 13.6.1.
CVE-2023-42877 affects macOS versions prior to 12.7.1, 13.6.1, and 14.1.
CVE-2023-42877 could potentially allow malicious applications to modify important system files, compromising system integrity.
Currently, the best approach is to update to the fixed versions of macOS, as there are no effective workarounds to mitigate this vulnerability.